Malware

International law enforcement operation shuts down Imminent Monitor RAT operations

A successful new operation was announced by Europol, it announced to have dismantled the global organized cybercrime ring behind Imminent Monitor…

6 years ago

Great Plains center hit by ransomware attack

A few days ago the Great Plains center was hit by a ransomware attack that forced its staff to to…

6 years ago

Group-IB presents its annual report on global threats to stability in cyberspace

Group-IB, has analyzed key recent changes to the global cyberthreat landscape in the “Hi-Tech Crime Trends 2019/2020” report. Group-IB, a…

6 years ago

Dutch National Cyber Security Centre warns ransomware infected thousands of businesses

According to a confidential report from the Dutch National Cyber Security Centre (NCSC), at least 1,800 companies were infected with…

6 years ago

RevengeHotels campaign – crooks target the hospitality industry

RevengeHotels campaign - The hospitality industry continues to be a privileged target for cybercriminals that target hotels, restaurant chains, and…

6 years ago

A Ransomware infected the network of the cybersecurity firm Prosegur

A piece of the Ryuk Ransomware infected the network of the multinational cybersecurity firm Prosegur, forcing the company to shut…

6 years ago

Microsoft warns of Dexphot miner, an interesting polymorphic threat

Microsoft revealed that the new Dexphot cryptocurrency miner has already infected more than 80,000 computers worldwide. Security experts at Microsoft…

6 years ago

Full(z) House Magecart group mix phishing and MiTM in its attacks

A group under the Magecart umbrella adopted a new tactic that leverages on MiTM and phishing attacks to target sites…

6 years ago

After 1 Million of malware samples analyzed

Malware Hunter - One year after its launch, Marco Ramilli shared the results of its project that has analyzed more…

6 years ago

Raccoon Stealer campaign circumvents Microsoft and Symantec anti-spam messaging gateways

Crooks behind the Raccoon Stealer have adopted a simple and effective technique to circumvent popular anti-spam messaging gateways. Cybercriminals behind…

6 years ago

This website uses cookies.